Introducing and Exploring the Extremist Cybercrime Database (ECCD)

This study uses open source, public information to examine nation-state and non-nation-state ideologically motivated cyberattacks performed against US targets from 1998 to 2018. We created the Extremist Cyber Crime Database (ECCD) that includes scheme, offender and target codebooks to address gaps in existing research and better inform policymakers. We describe our open source collection procedures, the type of information uncovered, and how we assessed their quality and reliability. We highlight our findings, compare these extremist cyber-crimes to extremist real world violence, and discuss their conceptual and policy implications.

[1]  Thomas J. Holt,et al.  Examining the Characteristics That Differentiate Jihadi-Associated Cyberattacks Using Routine Activities Theory , 2021, Social Science Computer Review.

[2]  Kyung-shick Choi,et al.  Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events , 2021, Journal of Contemporary Criminal Justice.

[3]  A. Goldsmith,et al.  Digital Drift and the “Sense of Injustice”: Counter-Productive Policing of Youth Cybercrime , 2019 .

[4]  Thomas J. Holt,et al.  Examining Ideologically Motivated Cyberattacks Performed by Far-Left Groups , 2019, Terrorism and Political Violence.

[5]  David Maimon,et al.  Cyber-Dependent Crimes: An Interdisciplinary Review , 2019, Annual Review of Criminology.

[6]  B. Payne,et al.  Using Labeling Theory as a Guide to Examine the Patterns, Characteristics, and Sanctions Given to Cybercrimes , 2018, American Journal of Criminal Justice.

[7]  R. Spaaij The Age of Lone Wolf Terrorism , 2017 .

[8]  Joshua D. Freilich,et al.  Exploring the Subculture of Ideologically Motivated Cyber-Attackers , 2017 .

[9]  Richard Clayton,et al.  Exploring the Provision of Online Booter Services , 2016 .

[10]  T. Holt,et al.  Cybercrime in Progress: Theory and prevention of technology-enabled offenses , 2015 .

[11]  Joshua D. Freilich,et al.  The future of terrorism research: a review essay , 2015 .

[12]  Joshua D. Freilich,et al.  Investigating the Applicability of Macro-Level Criminology Theory to Terrorism: A County-Level Analysis , 2015 .

[13]  Joshua D. Freilich,et al.  Criminology Theory and Terrorism: Introduction to the Special Issue , 2015 .

[14]  Joshua D. Freilich,et al.  Routine Activities and Right-Wing Extremists: An Empirical Comparison of the Victims of Ideologically- and Non-Ideologically-Motivated Homicides Committed by American Far-Rightists , 2015 .

[15]  Jeff Gruenewald,et al.  Introducing the United States Extremis Crime Database (ECDB) , 2014 .

[16]  John Horgan,et al.  Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡ , 2013, Journal of forensic sciences.

[17]  T. Holt Exploring the Intersections of Technology, Crime, and Terror , 2012 .

[18]  Joshua D. Freilich,et al.  American Terrorism and Extremist Crime Data Sources and Selectivity Bias: An Investigation Focusing on Homicide Events Committed by Far-Right Extremists , 2012 .

[19]  Joshua D. Freilich,et al.  Critical events in the life trajectories of domestic extremist white supremacist groups , 2009 .

[20]  Joshua D. Freilich,et al.  Surveying American State Police Agencies About Terrorism Threats, Terrorism Sources, and Terrorism Definitions , 2009 .

[21]  Gary LaFree,et al.  Introducing the Global Terrorism Database , 2007 .

[22]  T. Holt subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .

[23]  Joseph R. Dominick,et al.  Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages , 2004 .

[24]  Joshua D. Freilich,et al.  How social movement organizations explicitly and implicitly promote deviant behavior: The case of the militia movement , 1999 .

[25]  Victoria A. Jangada Correia,et al.  An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom , 2022, SN Comput. Sci..